//]]>
Language and Automata Theory and Applications by Dediu, Adrian-Horia. Publication: . XII, 556p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Building a National Distributed e-Infrastructure–PL-Grid by Bubak, Marian. Publication: . XII, 354 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Partially Supervised Learning by Schwenker, Friedhelm. Publication: . X, 159 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mathematical Modeling and Computational Science by Adam, Gheorghe. Publication: . XII, 336p. 127 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithms for Sensor Systems by Erlebach, Thomas. Publication: . X, 239p. 36 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Wireless Sensor Networks by Picco, Gian Pietro. Publication: . XII, 261p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Parallel and Scientific Computing by Jónasson, Kristján. Publication: . XXVII, 339p. 155 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Applied Parallel and Scientific Computing by Jónasson, Kristján. Publication: . XXVIII, 477p. 170 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Parameterized and Exact Computation by Marx, Dániel. Publication: . VIII, 273p. 28 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Topics in Cryptology – CT-RSA 2012 by Dunkelman, Orr. Publication: . XI, 434p. 85 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Verification, Model Checking, and Abstract Interpretation by Kuncak, Viktor. Publication: . X, 457p. 111 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Foundations and Practice of Security by Garcia-Alfaro, Joaquin. Publication: . XIII, 253 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Applications by Jung, Souhwan. Publication: . XII, 271p. 74 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
SOFSEM 2012: Theory and Practice of Computer Science by Bieliková, Mária. Publication: . XVII, 674 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Computation, Physics and Beyond by Dinneen, Michael J. Publication: . XIII, 427p. 64 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . Approx. 335 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Theory of Security and Applications by Mödersheim, Sebastian. Publication: . IX, 225 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Smart Card Research and Advanced Applications by Prouff, Emmanuel. Publication: . XI, 337 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Swarm, Evolutionary, and Memetic Computing by Panigrahi, Bijaya Ketan. Publication: . XXII, 332p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Swarm, Evolutionary, and Memetic Computing by Panigrahi, Bijaya Ketan. Publication: . XXII, 754 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Refine your search